Description: This course is designed to explain the role each individual has in counterintelligence. CI Awareness and Reporting summarizes the potential threats and collection methods used by Foreign Intelligence Entities (FIE), Potential Espionage Indicators (PIE), warning signs of terrorism, and reporting responsibilities. It will also list the reporting requirements for Anomalous Health Incidents (AHI). An Anomalous Health Incidentis when one or more individuals may experience an unexplained sensory event coupled with physical symptoms. Show Course Resources: Access this course's resources Learning Objectives: This course is designed to enable students to:
Delivery Method: eLearning Length: 60 minutes Target Audience: This course is designed for cleared industry security professionals, DOD security professionals, and Federal agency partner security professionals. Requirements:
Prerequisites: N/A Credits Recommended/Earned:
System Requirements: Check if your system is configured appropriately to use STEPP. CDSE courses are intended for use by Department of Defense and other U.S. Government personnel and contractors within the National Industrial Security Program. Which of the following terms identity information gathered and activities conducted to identify, deceive exploit, disrupt, or protect against espionage, other intelligence activities, sabotage, or assassinations conducted for or on behalf of foreign powers, organizations, or persons, or their agents, or international terrorists organizations or activities? Sets with similar termsRecommended textbook solutions
Mathematics with Business Applications6th EditionMcGraw-Hill Education 3,760 solutions
Fundamentals of Financial Management, Concise Edition10th EditionEugene F. Brigham, Joel Houston 777 solutions
Accounting: What the Numbers Mean9th EditionDaniel F Viele, David H Marshall, Wayne W McManus 338 solutions Business Math17th EditionMary Hansen 3,684 solutions What types of information do foreign intelligence entities want?Foreign entities are actively engaged in efforts to gain information from the U.S. and its allies. To defeat our objectives and advance their interests, they attempt to collect information about our plans, technologies, activities, and operations.
Which of the following are common foreign intelligence entity methods of collection?Most Commonly Used Collection Methods.. Unsolicited and Direct Requests.. Suspicious Network Activity.. Targeting at Conferences, Conventions, and Trade Shows.. Insider Threat.. Foreign Visits.. Solicitation and Seeking Employment.. If you suspect you may have been a target of this method, report it to your FSO.. Which DoD Directive governs counter?Department of Defense (DOD) Components are required by DOD Directive 5240.06 to provide Counterintelligence Awareness and Reporting training to all personnel within 30 days of initial assignment, or employment to the Component, and every 12 months thereafter.
How is counterintelligence defined Executive Order 12333?(a) Counterintelligence means information gathered and activities conducted to protect against espionage, other intelligence activities, sabotage, or assassinations conducted for or on behalf of foreign powers, organizations or persons, or international terrorist activities, but not including personnel, physical, ...
|